Integrity Preserving Outsourcing Model in Cloud with Proxy Based Public Auditing
Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0
Abstract
Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services. Secured data storage and retrieval is challenging when the storage system is distributed and has no central authority further, security risk is developed towards accuracy of data in cloud i.e., the client’s outsourced data is securely stored by the storage server or not. To address these issues we propose a scheme that uses Random key generation and Session tracking methodology that serves to identify unauthorized users who try to steal the information stored in cloud. We have also modulated the work done by cloud admin and data owner by introducing a proxy and a third party auditor which assists in auditing and repairing activity. Thus our scheme ensures the integrity of the outsourced data and also focuses on identifying and reporting unauthorized users.
Authors and Affiliations
Ahamed Ali S. , Dr. M. Ramakrishnan
Enterprise Architecture Development of Mercu Buana University Based on TOGAF: An Introduction
This paper proposed TOGAF to develop enterprice architecture of Mercu Buana University due to sharp increasing in number of students. This development must keep in line the bussines goal and information system used in Un...
Multicast Routing and Data Mining in Wired Networks: A Comprehensive Study
Multicast routing is a collection leaning massage whose objective is to hold the spread of data from a dispatcher to all the recipient of a multicast group while annoying to use the obtainable bandwidth professionally, i...
ANALYSIS ON THE QUALITY OF THREE-PHASE TRANSFORMER OIL
Tangent delta is an electrical diagnostic method to determine the condition of the insulation. One of the insulation to know is transformer oil being a liquid insulation. In a transformer, insulation is an important part...
The False Positive Alert Reduction Using Data mining Techniques in Intrusion Detection System
Information security is a vital aspect of any organization. Most of the organizations relay and trust on the intrusion Detection System (IDS) which play important role in detecting intrusions in data network environment....
Study on Calibration of Sea Wave Height Using Synthetic Aperture Radar Image Based on Grey Level Co-occurrence Matrix: Case on Multi Polarization P Band
Indonesian archipilago had 70% sea area of its total area. Due to safety factor in sea transportation fishery and tourism, sea wave height in all area in Indonesia must be known. Lack of the information on the height of...